CI105 Preservation Letters: Their Vital Role in Investigations

Provider: National White Collar Crime Center (NW3C)

Target Audience: Investigators, Officers, Prosecutors

Topic Area: Cyber Forensics, Cyber Investigations, High Tech Crimes, Investigations

Event Type: Training

Delivery Method: Online

PL-WB

With the rise of electronic evidence and the likelihood that the crimes you’re investigating are conducted with or supported by the use of mobile devices, the Internet, or cloud-based applications, preservation letters provide a means to prevent the destruction of electronic records and buy an investigator time to retrieve and analyze potential evidence.

 » Read more


Click here for more information

CI104 Virtual Currency

Provider: National White Collar Crime Center (NW3C)

Target Audience: Chiefs, Investigators, Officers, Prosecutors

Topic Area: High Tech Crimes, Investigations, Law Enforcement Initiatives

Event Type: Training

Delivery Method: Online

VC2-WB

This online course covers basic information and concepts that serve as an introduction to virtual currencies and their relationship to other types of currency. The course describes different types of virtual currencies and covers the main differences between decentralized and centralized currencies. Focusing on Bitcoin®, students will learn what Bitcoin is, how it is stored, and what are some investigative tips for law enforcement.

 » Read more


Click here for more information

Human Trafficking 101: A Primer for Prosecutors and Investigators

Provider: National White Collar Crime Center (NW3C)

Target Audience: Chiefs, Investigators, Officers, Prosecutors

Topic Area: Investigations, Law Enforcement Initiatives, Public Safety, Training

Event Type: Webinar

Delivery Method: Webinar

HTAP-OD

On Demand
Duration: 70 Minutes

This webinar provides fundamental knowledge about human trafficking including defining the crime, addressing why it occurs and why it is unique, reviewing the relevant human trafficking criminal laws, and providing information on how to identify human trafficking, start an investigation, and prosecute the case.

 » Read more


Click here for more information

Digital Evidence for Judges (DEJ)

Provider: National Computer Forensics Institute (NCFI)

Target Audience: Prosecutors

Topic Area: Cyber Forensics, Cyber Investigations

There is a digital component to nearly every crime.  Today’s judge should have an understanding an insight of technology used in criminal cases involving digital evidence from computers, mobile devices, the cloud and other sources.  DEJ is a 5-day course that provides every attendee with the requisite knowledge using a combination of lecture and practical exercises.  One hour of ethics instruction will be included.

During this course, you will learn:
 

  • Introduction to Cyber Crime and Computer Forensics
  • Computer Hardware
  • Operating Systems and their Respective Forensic Artifacts
  • Data Concepts
  • Search and Seizure of Digital Evidence
  • The Electronic Communications Privacy Act (ECPA) and Authorizing the Collection of Digital Evidence from Third Party Providers
  • The Forensic Process
  • Electronic Evidence
  • Introduction to Networks and the Internet
  • Social Media
  • Evaluating Expert Testimony
  • Fifth Amendment: Encryption and Passwords

 

 » Read more


Click here for more information

Advanced Digital Evidence for Prosecutors (ADEP)

Provider: National Computer Forensics Institute (NCFI)

Target Audience: Prosecutors

Topic Area: Cyber Forensics, Cyber Investigations

Event Type: Training

Delivery Method: Classroom

Understanding the forensic process is critical for a prosecutor navigating a criminal case with digital evidence.  Prosecutors will dive deep into computers and mobile devices to find hidden artifacts, and learn to analyze multiple data sources together.  ADEP is a 5-day course that provides every attendee with the requisite skills using a combination of lecture and practical exercises.  One hour of ethics instruction will be included.

During this course, you will learn:
 

  • The Forensic Process for Computers and Mobile Devices
  • Sources of Digital Evidence
  • OSX/Windows and their Respective Forensic Artifacts
  • Data Carving
  • Digital Data Analytics
  • Search and Seizure of Digital Evidence
  • Writing Search Warrants
  • Cloud Storage
  • Encryption
  • Networks: Email,

 » Read more


Click here for more information

IACP Conference